Y Ju, Y Chen, Z Cao, L Liu, Q Pei… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The mobile edge computing (MEC) technology can simultaneously provide high-speed computing services for multiple vehicular users (VUs) in vehicular edge computing (VEC) …
Y Zhang, Z Mou, F Gao, J Jiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) can be employed as aerial base stations to support communication for the ground users (GUs). However, the aerial-to-ground (A2G) channel …
In this paper, we propose a secure computationoffloading scheme (SCOS) in intelligently connected vehicle (ICV) networks, aiming to minimize overall latency of computing via …
X Lu, L Xiao, C Dai, H Dai - IEEE Wireless Communications, 2020 - ieeexplore.ieee.org
Cellular systems have to resist smart jammers that can optimize their selection of jamming channels and powers based on the estimated ongoing network states. In this article, we …
A Li, Q Wu, R Zhang - IEEE Wireless Communications Letters, 2018 - ieeexplore.ieee.org
This letter proposes a novel unmanned aerial vehicle (UAV)-enabled mobile jamming scheme to improve the secrecy rate of ground wiretap channel. Specifically, a UAV is …
N Gao, Z Qin, X Jing, Q Ni, S Jin - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The downlink communications are vulnerable to intelligent unmanned aerial vehicle (UAV) jamming attack. In this paper, we propose a novel anti-intelligent UAV jamming strategy, in …
Y Yao, F Shu, Z Li, X Cheng… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
Vehicle-to-vehicle (V2V) communication applications face significant challenges to security and privacy since all types of possible breaches are common in connected and autonomous …
X Lu, L Xiao, G Niu, X Ji, Q Wang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Most safe reinforcement learning (RL) algorithms depend on the accurate reward that is rarely available in wireless security applications and suffer from severe performance …
L Xiao, C Xie, M Min, W Zhuang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) systems are vulnerable to smart attackers, who are selfish and subjective end-users and use smart radio devices to change their attack types and …